CN118199825A - Method and apparatus for wireless communication - Google Patents
Method and apparatus for wireless communication Download PDFInfo
- Publication number
- CN118199825A CN118199825A CN202311490797.3A CN202311490797A CN118199825A CN 118199825 A CN118199825 A CN 118199825A CN 202311490797 A CN202311490797 A CN 202311490797A CN 118199825 A CN118199825 A CN 118199825A
- Authority
- CN
- China
- Prior art keywords
- identity
- identities
- target
- node
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 94
- 238000000034 method Methods 0.000 title claims abstract description 28
- 230000011664 signaling Effects 0.000 claims abstract description 194
- 230000005540 biological transmission Effects 0.000 claims description 35
- 230000004044 response Effects 0.000 claims description 8
- 230000009286 beneficial effect Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 28
- 238000013507 mapping Methods 0.000 description 21
- 230000006870 function Effects 0.000 description 18
- 238000012545 processing Methods 0.000 description 17
- 230000008901 benefit Effects 0.000 description 9
- 238000007726 management method Methods 0.000 description 9
- 101100292100 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) PHO92 gene Proteins 0.000 description 5
- 101100478213 Schizosaccharomyces pombe (strain 972 / ATCC 24843) spo5 gene Proteins 0.000 description 5
- 230000006978 adaptation Effects 0.000 description 5
- 230000006835 compression Effects 0.000 description 4
- 238000007906 compression Methods 0.000 description 4
- 238000004590 computer program Methods 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 230000007774 longterm Effects 0.000 description 4
- 230000008054 signal transmission Effects 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 3
- 238000013468 resource allocation Methods 0.000 description 3
- 230000011218 segmentation Effects 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 125000004122 cyclic group Chemical group 0.000 description 2
- 230000006837 decompression Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 230000002708 enhancing effect Effects 0.000 description 2
- 230000002349 favourable effect Effects 0.000 description 2
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical group [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 2
- 230000010363 phase shift Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 230000027311 M phase Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000005304 joining Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 239000004575 stone Substances 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0053—Allocation of signaling, i.e. of overhead other than pilot signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/30—Resource management for broadcast services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A method and apparatus for wireless communication includes receiving first signaling, the first signaling being used to indicate a first set of identities of a first service, the first service being a non-unicast service, the first set of identities including a plurality of identities; determining a target identity; receiving the target data set by applying the target identity; wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set. The application receives the target data set by receiving the first signaling and determining the target identity, thereby being beneficial to improving the efficiency and saving the electric power.
Description
The application is a divisional application of the following original application:
Filing date of the original application: 2021, 01, 15
Number of the original application: 202110053788.2
-The name of the invention of the original application: method and apparatus for wireless communication
Technical Field
The present application relates to a transmission method and apparatus in a wireless communication system, and more particularly, to a method for improving efficiency and reducing redundancy in wireless communication in relation to header compression.
Background
Future wireless communication systems have more and more diversified application scenes, and different application scenes have different performance requirements on the system. To meet the different performance requirements of various application scenarios, a New air interface technology (NR) is decided to be researched in 3GPP (3 rd Generation Partner Project, third Generation partnership project) RAN (Radio Access Network ) #72 full-time, and a standardization Work for NR is started in 3GPP RAN #75 full-time with NR's WI (Work Item).
In Communication, both LTE (Long Term Evolution ) and 5G NR can be involved in reliable accurate reception of information, optimized energy efficiency ratio, determination of information validity, flexible resource allocation, scalable system structure, efficient non-access layer information processing, lower service interruption and disconnection rate, support for low power consumption, which is important for normal Communication of base stations and user equipments, reasonable scheduling of resources, balancing of system load, so-called high throughput, meeting Communication requirements of various services, improving spectrum utilization, improving base stone of service quality, whether eMBB (ehanced Mobile BroadBand, enhanced mobile broadband), URLLC (Ultra Reliable Low Latency Communication, ultra-high reliability low-latency Communication) or eMTC (ENHANCED MACHINE TYPE Communication ) are indispensable. Meanwhile, in the internet of things in the industry of IIoT (Industrial Internet of Things), in V2X (Vehicular to X), in ProSe (Proximity Services, near field communication), in Device to Device communication, in unlicensed spectrum communication, in user communication quality monitoring, in network planning optimization, in NTN (Non Territerial Network, non-terrestrial network communication), in TN (TERRITERIAL NETWORK, terrestrial network communication), in dual connectivity (Dual connectivity) systems, in systems using sidelinks (Sidelink), in the above mixture of various communication modes, in codebook selection of radio resource management and multiple antennas, in signaling design, neighbor management, traffic management, in beamforming, there are wide demands, and the transmission modes of information are broadcast multicast and unicast, which are all indispensable for satisfying the above demands, in order to increase network coverage, improve system reliability, and also can be forwarded by relay.
With the increasing of the scene and complexity of the system, the system has higher requirements on reducing the interruption rate, reducing the time delay, enhancing the reliability, enhancing the stability of the system, and the flexibility of the service, and saving the power, and meanwhile, the compatibility among different versions of different systems needs to be considered in the system design.
Disclosure of Invention
In various communication scenarios, transmission of broadcast multicast/multicast traffic, i.e. non-unicast traffic, may be involved. Including a very important class of content-diverse and variable service applications, users join a broadcast-multicast service, but the received data or content is different according to circumstances, e.g. depending on the location of the UE or other factors. If a cell is relatively large, such as an NTN cell, it may be desirable to subdivide the area covered by the cell into a plurality of relatively small areas corresponding to different content of the same service. How to let the user receive the content that he needs to receive is a problem and since this service is sent in broadcast multicast form, there is a need to guarantee that the reception of other users cannot be affected. It is easy to understand that a UE need not receive all content data at the same time, only needs to receive the data that it needs to receive, and this way is also more power-saving and also necessary, otherwise confusion is easily generated, which causes trouble to the user. In the existing system, different contents generally belong to different PDU sessions and/or different services, and are relatively easy to distinguish, but for the same service, it is very difficult for the same PDU session to support variable contents, and other methods are necessary. Further, as long as the small cells are small enough, such as a common TN cell, different cells send different contents, which is also a feasible method, a UE switches to other cells, and the received contents also change, but as for a large cell, different contents of the same service need to be transmitted in parallel for multiple areas within the coverage area of the large cell, because each small area may have user receiving, cell-level distinction is not feasible, and other ways are needed to distinguish the contents of the service, so that the UE can receive the correct contents, and at the same time, the power saving and other characteristics are ensured. The application solves the above problems by determining the identity of the target and thus the data set to be received.
In view of the above problems, the present application provides a solution.
It should be noted that, in the case of no conflict, the embodiments of any node of the present application and the features in the embodiments may be applied to any other node. The embodiments of the application and the features of the embodiments may be combined with each other arbitrarily without conflict.
The application discloses a method used in a first node of wireless communication, comprising the following steps:
Receiving first signaling, wherein the first signaling is used for indicating a first identity set of a first service, the first service is a non-unicast service, and the first identity set comprises a plurality of identities; determining a target identity; receiving the target data set by applying the target identity;
Wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the first node is used to determine the target identity.
As one embodiment, the problems to be solved by the present application include: a relatively large cell, when transmitting multiple data sets of a non-unicast service in parallel, uses the location of the user to determine which data set to receive. These data sets all belong to the same service and the same PDU (Protocol Data Unit ) session. In addition, a UE preferably listens to/detects/receives only what it needs, which is the most power efficient and least complex. In addition, it is preferable for a UE to be relatively seamless when switching between different contents, without requiring user involvement.
As one example, the benefits of the above method include: firstly, a UE can monitor/detect/receive the content of a service needed by itself in a larger cell, the service is a non-unicast service, and the service is applicable to different contents in different geographic areas.
Specifically, according to one aspect of the present application, a first message is transmitted, the first message being used to indicate at least one of location information or a first area identity of the first node; the location information of the first node is used to determine the first area identity;
a second signaling is received, the second signaling indicating the target identity.
Specifically, according to one aspect of the present application, the first signaling indicates a first set of areas, the first set of areas including K areas, the K areas of the first set of areas being respectively associated with the K identities in the first set of identities; the first set of regions and the location of the first node are used together to determine the target identity.
Specifically, according to one aspect of the present application, each identity in the first set of identities is a group common RNTI; the first signaling indicates a second set of identities, the second set of identities comprising K identities; the K identities of the second identity set are in one-to-one correspondence with the K identities of the first identity set; any identity in the second set of identities is one of a { logical channel identity, radio bearer identity }; the K data sets of the first service are transmitted simultaneously applying the K identities of the first identity set and the K identities of the second identity set, respectively.
Specifically, according to one aspect of the present application, the first signaling indicates K flows of the first service, where the K flows of the first service are mapped onto the same radio bearer in a one-to-one correspondence with the K data sets.
Specifically, according to one aspect of the present application, first information is received, the first information being used to indicate K1 search spaces; each identity of the first set of identities is a group common RNTI; each K identities of the first set of identities is associated with one of the K1 search spaces, where K1 is a positive integer no greater than K.
Specifically, according to one aspect of the application, a second target identity is applied to receive a second target data set prior to determining the target identity; resetting or releasing the RLC entity for receiving the second set of target data in response to determining the target identity; the second target data set belongs to the first service; the second target identity belongs to the first identity set; the second target identity is different from the target identity.
In particular, according to one aspect of the application, the first node is a user equipment.
Specifically, according to an aspect of the present application, the first node is an internet of things terminal.
In particular, according to one aspect of the application, the first node is a relay.
Specifically, according to one aspect of the present application, the first node is a vehicle-mounted terminal.
In particular, according to one aspect of the application, the first node is an aircraft.
The application discloses a method used in a second node of wireless communication, comprising the following steps:
transmitting first signaling, wherein the first signaling is used for indicating a first identity set of a first service, the first service is a non-unicast service, and the first identity set comprises a plurality of identities; a receiver of the first signaling determines a target identity and receives the target data set using the target identity;
wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the recipient of the first signaling is used to determine the target identity.
Specifically, according to one aspect of the present application, a first message is received, the first message being used to indicate at least one of location information or a first area identity of the first node; the location information of the sender of the first message is used to determine the first zone identity;
and sending a second signaling, wherein the second signaling indicates the target identity.
Specifically, according to one aspect of the present application, the first signaling indicates a first set of areas, the first set of areas including K areas, the K areas of the first set of areas being respectively associated with the K identities in the first set of identities; the first set of regions and the location of the receiver of the first signaling are used together to determine the target identity.
Specifically, according to one aspect of the present application, each identity in the first set of identities is a group common RNTI; the first signaling indicates a second set of identities, the second set of identities comprising K identities; the K identities of the second identity set are in one-to-one correspondence with the K identities of the first identity set; any identity in the second set of identities is one of a { logical channel identity, radio bearer identity }; the K data sets of the first service are transmitted simultaneously applying the K identities of the first identity set and the K identities of the second identity set, respectively.
Specifically, according to one aspect of the present application, the first signaling indicates K flows of the first service, where the K flows of the first service are mapped onto the same radio bearer in a one-to-one correspondence with the K data sets.
Specifically, according to one aspect of the present application, first information is transmitted, the first information being used to indicate K1 search spaces; each identity of the first set of identities is a group common RNTI; each K identities of the first set of identities is associated with one of the K1 search spaces, where K1 is a positive integer no greater than K.
Specifically, according to one aspect of the present application, the receiver of the first signaling receives a second set of target data using a second target identity before determining the target identity; in response to determining the target identity, the receiver of the first signaling resets or releases an RLC entity for receiving the second target data set; the second target data set belongs to the first service; the second target identity belongs to the first identity set; the second target identity is different from the target identity.
In particular, according to an aspect of the application, the second node is a user equipment.
Specifically, according to an aspect of the present application, the second node is an internet of things terminal.
In particular, according to one aspect of the application, the second node is a relay.
Specifically, according to an aspect of the present application, the second node is a vehicle-mounted terminal.
In particular, according to one aspect of the application, the second node is an aircraft.
In particular, according to one aspect of the application, the second node is a base station.
In particular, according to one aspect of the application, the second node is a gateway.
In particular, according to one aspect of the application, the second node is an access point.
The application discloses a first node for wireless communication, comprising:
A first receiver that receives first signaling, the first signaling being used to indicate a first set of identities of a first service, the first service being a non-unicast service, the first set of identities comprising a plurality of identities; determining a target identity; receiving the target data set by applying the target identity;
Wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the first node is used to determine the target identity.
The application discloses a second node for wireless communication, comprising:
A second transmitter that transmits first signaling, the first signaling being used to indicate a first set of identities of a first service, the first service being a non-unicast service, the first set of identities comprising a plurality of identities; a receiver of the first signaling determines a target identity and receives the target data set using the target identity;
wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the recipient of the first signaling is used to determine the target identity.
As an embodiment, the present application has the following advantages over the conventional scheme:
first, in conventional TN systems, cells are typically not so large, at least as large as NTN cells, which can reach hundreds of kilometers or even 500 kilometers, and insufficient resolution of the cells is encountered when providing cell-based or location-dependent services in such large cells. It is difficult to support location-related services in larger cells without using the proposed method of the present application.
In addition, if a larger cell concurrently transmits data of each service related to a specific smaller area, the user cannot distinguish the data by receiving different contents through different cells because of the same service, and one possible method is to receive all the data, and the application layer or permission of the user can distinguish the data; however, the method is more electricity consuming, and the user can not receive other services at the same time due to the overlarge data volume received by the user.
In addition, in the conventional method, if the location-related service is transmitted, it is common to transmit different contents in units of one cell, even a plurality of cells, and different cells or a plurality of cells, and a UE moves to different areas, it is natural to receive different contents, and thus it is transparent or nearly transparent to the UE, and the UE does not need complicated processing. However, if a plurality of service data related to the location are transmitted in parallel from the same larger cell, the required content data cannot be determined correctly without user participation; by using the method provided by the application, the user can correctly receive and only receive the required service data without excessively complex processing.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings in which:
FIG. 1 illustrates a flow diagram for receiving first signaling, determining a target identity, and applying the target identity to receive a target data set, according to one embodiment of the application;
FIG. 2 shows a schematic diagram of a network architecture according to one embodiment of the application;
Fig. 3 shows a schematic diagram of an embodiment of a radio protocol architecture of a user plane and a control plane according to an embodiment of the application;
FIG. 4 shows a schematic diagram of a first communication device and a second communication device according to one embodiment of the application;
fig. 5 shows a flow chart of the transmission of wireless signals according to one embodiment of the application;
Fig. 6 shows a flow chart of the transmission of wireless signals according to one embodiment of the application;
FIG. 7 shows a schematic diagram of a plurality of regions according to one embodiment of the application;
FIG. 8 shows a schematic diagram of determining a target identity according to one embodiment of the application;
Fig. 9 shows a schematic diagram of a first signaling and target data set transmission according to an embodiment of the application;
FIG. 10 shows a schematic diagram of a target identity according to one embodiment of the application;
FIG. 11 shows a schematic diagram of a target identity according to one embodiment of the application;
FIG. 12 shows a schematic diagram of target identity and search space according to one embodiment of the application;
FIG. 13 illustrates a schematic diagram of a processing device for use in a first node in accordance with one embodiment of the application;
fig. 14 illustrates a schematic diagram of a processing arrangement for use in a second node according to an embodiment of the application.
Detailed Description
The technical scheme of the present application will be described in further detail with reference to the accompanying drawings, and it should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be arbitrarily combined with each other.
Example 1
Embodiment 1 illustrates a flow chart of receiving a first signaling, determining a target identity, and applying the target identity to receive a target data set according to one embodiment of the application, as shown in fig. 1. In fig. 1, each block represents a step, and it is emphasized that the order of the blocks in the drawing does not represent temporal relationships between the represented steps.
In embodiment 1, a first node in the present application receives first signaling in step 101; determining a target identity in step 102; a flow chart of receiving a target data set using a target identity in step 103;
Wherein the first signaling is used to indicate a first set of identities of a first service, the first service being a non-unicast service, the first set of identities comprising a plurality of identities; the first service comprises K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the first node is used to determine the target identity.
As an embodiment, the first node is a UE.
As an embodiment, the first signaling comprises RRC signaling.
As an embodiment, the first signaling includes RRCReconfiguration.
As an embodiment, the first signaling includes at least a portion of the fields in RRCReconfiguration.
As an embodiment, the first signaling includes RRCConnectionReconfiguration.
As an embodiment, the first signaling includes RRCRELEASE.
As an embodiment, the first signaling comprises a system message block (System Information Block, SIB).
As an embodiment, the first signaling includes SIBs related to multicast broadcast services (MBS, multicast and Broadcast Service (s)).
As an embodiment, the first signaling comprises a SIB related to multicasting.
As an embodiment, the first signaling comprises SIB related to V2X or ProSe.
As an embodiment, the first signaling comprises SIBs related to the sidelink.
As an embodiment, the first signaling is transmitted on an MCCH (Multicast Control Channel ) channel.
As an embodiment, the first signaling is transmitted on an SC-MCCH (SINGLE CELL Multicast Control Channel ) channel.
As an embodiment, the first signaling is transmitted on a BCCH (Broadcast Control Channel ) channel.
As an embodiment, the first signaling is transmitted on an SCCH (Sidelink Control Channel ) channel.
As an embodiment, the first signaling is used to configure an MTCH (Multicast TRAFFIC CHANNEL) channel.
As an embodiment, the first signaling is used to configure an SC-MTCH (SINGLE CELL Multicast TRAFFIC CHANNEL ) channel.
As an embodiment, the first signaling is sent in a broadcast manner.
As an embodiment, the first signaling is sent in a unicast manner.
As an embodiment, the first signaling is sent periodically.
As an embodiment, the first signaling is sent when a multicast service session change occurs, for example, a multicast service session start or session stop occurs.
As an embodiment, the sender of the first signaling is the same as the sender of the K data sets.
As an embodiment, the sender of the first signaling is different from the sender of the K data sets.
As a sub-embodiment of this embodiment, the sender of the first signaling is the MCG of the first node; the sender of the K data sets is the SCG of the first node.
As a sub-embodiment of this embodiment, the sender of the first signaling is a Pcell of the first node; the sender of the K data sets is the Scell of the first node.
As a sub-embodiment of this embodiment, the sender of the first signaling is a source cell (source cell) of the first node; the sender of the K data sets is a destination cell (TARGET CELL) of the first node.
As a sub-embodiment of this embodiment, the sender of the first signaling is the serving cell of the first node; the sender of the K data sets is a relay of the first node.
As a sub-embodiment of this embodiment, the sender of the first signaling is a TN cell; the sender of the K data sets is an NTN cell.
As a sub-embodiment of this embodiment, the sender of the first signaling is an NTN cell; the sender of the K data sets is a TN cell.
As an embodiment, the first signaling is transmitted over an SRB (SIGNALLING RADIO BEARER, signaling radio bearer).
As an embodiment, the first signaling is transmitted via SRB0 (SIGNALLING RADIO BEARER a, signaling radio bearer 0).
As an embodiment, the first signaling is transmitted via SRB1 (SIGNALLING RADIO BEARER, signaling radio bearer 1).
As an embodiment, the first signaling is transmitted over SRB2 (SIGNALLING RADIO BEARER, signaling radio bearer 2).
As an embodiment, the first signaling is transmitted over SRB3 (SIGNALLING RADIO BEARER, signaling radio bearer 3).
As an embodiment, the first signaling comprises a USD of the first service.
As an embodiment, the first node receives the USD of the first service through signaling of the core network.
As an embodiment, the first signaling is not transmitted over any SRB.
As an embodiment, the first service comprises a broadcast service.
As an embodiment, the first service comprises a multicast service.
As an embodiment, the first traffic comprises multicast traffic.
As an embodiment, the first service includes an MBMS (Multimedia Broadcast Multicast Service ) service.
As an embodiment, the first service includes an MBS (Multicast Broadcast Service ) service.
As an embodiment, the first service includes a 5G MBS service.
As an embodiment, the first service comprises ProSe service.
As an embodiment, the first service includes a V2X service.
As one embodiment, the first service includes an ITS (INTELLIGENT TRANSPORTATION SYSTEM ) service.
As an embodiment, the first traffic comprises local multicast traffic.
As an embodiment, the first traffic comprises local dependant (locally dependent) multicast traffic.
As an embodiment, the first set of identities comprises at least 2 identities.
As an embodiment, the first set of identities comprises at least K identities, K being an integer greater than 1.
As an embodiment, the K identities in the first set of identities are in one-to-one correspondence with the K sets of data.
As an embodiment, if one of the K data sets needs to be received, the identity in the first identity set corresponding to the one data set needs to be applied for receiving.
As one embodiment, each identity in the first set of identities is a search space (SEARCH SPACE) identity.
As one embodiment, each identity in the first set of identities is a common search space (SEARCH SPACE) identity.
As an embodiment, each identity of the first set of identities is a cell search space (SEARCH SPACE) identity.
As an embodiment, each identity in the first set of identities is a cell common search space (SEARCH SPACE) identity.
As an embodiment, each identity in the first set of identities is SEARCHSPACEID.
As an embodiment, each identity in the first set of identities is a group public RNTI (Radio Network Tempory Identity, radio network temporary identity).
As an embodiment, each identity in the first set of identities is group common RNTI (group public RNTI).
As an embodiment, each identity of the first set of identities is a group-common RNTI (group common RNTI).
As an embodiment, each identity in the first set of identities is a G-RNTI.
As an embodiment, each identity in the first set of identities is an M-RNTI.
As an embodiment, the group common RNTI includes group common RNTI.
As an embodiment, the group common RNTI includes a group-common RNTI.
As an embodiment, the group common RNTI includes a G-RNTI.
As one embodiment, the group common RNTI includes an M-RNTI.
As an embodiment, the group common RNTI does not include a C-RNTI.
As an embodiment, each identity in the first set of identities is a Logical Channel Identity (LCID).
As an embodiment, each identity of the first set of identities is a radio bearer identity.
As a sub-embodiment of this embodiment, the radio bearer identified by the one radio bearer identity is a radio bearer used for transmitting the first service.
As an embodiment, each of the K data sets includes at least one data.
As an embodiment, each of the K data sets is non-null.
As an embodiment, the K data sets are sent over K radio bearers, respectively, the identities of the K radio bearers being the K identities in the first identity set, respectively.
As a sub-embodiment of this embodiment, the K radio bearers include non-unicast bearers.
As a sub-embodiment of this embodiment, the K radio bearers include unicast bearers.
As a sub-embodiment of this embodiment, the K radio bearers include multicast bearers.
As a sub-embodiment of this embodiment, the K radio bearers include MRB (Multicast Radio Bearer).
As a sub-embodiment of this embodiment, the K radio bearers include SC-MRB (SINGLE CELL MRB).
As a sub-embodiment of this embodiment, the K radio bearers include DRBs (Data Radio Bearer, data radio bearers).
As an embodiment, the K data sets include at least 2 data sets.
As an embodiment, the K data sets include IP data.
As an embodiment, the K data sets include ethernet data.
As an embodiment, the K data sets include UDP data.
As an embodiment, the K data sets include RTP data.
As one embodiment, the K data sets include TCP data.
As an embodiment, the K data sets comprise unstructured data.
As an embodiment, the K data sets include application layer data.
As an embodiment, the K data sets comprise data from the core network.
As an embodiment, the K data sets include non-access stratum data.
As an embodiment, the K data sets include data of the first service.
As one embodiment, the K data sets include data of IP flow (IP flow).
As one embodiment, the K data sets include QoS flow (QoS flow) data.
As an embodiment, the K data sets include SDAP (SERVICE DATA Adaptation Protocol, traffic data adaptation protocol) PDUs.
As an embodiment, the K data sets include SDAP (SERVICE DATA Adaptation Protocol, traffic data adaptation protocol) data PDUs.
As an embodiment, said K is equal to 2.
As an embodiment, the K is equal to 3.
As an embodiment, said K is equal to 4.
As an embodiment, said K is equal to 8.
As an embodiment, said K is equal to 16.
As an embodiment, the K is configurable.
As one embodiment, the K data sets include the target data set.
As an embodiment, the first set of identities comprises the target identity.
As an embodiment, the K data sets are sent in parallel by the first serving cell of the first node.
As an embodiment, the first serving cell of the first node sends the K data sets simultaneously.
As an embodiment, the K data sets are transmitted in the same cell.
As an embodiment, the K data sets are transmitted in the same cell group.
As an embodiment, the transmission of the K data sets is not sequential in time.
As an embodiment, the K data sets may be transmitted simultaneously in time, and UEs at different locations receive only one of the K data sets.
As an embodiment, the K data sets have a one-to-one mapping relationship with the K identities in the first identity set.
As an embodiment, a serving cell of the first node sends the K data sets using the K identities, respectively.
As an embodiment, the sender of the first signaling sends the K data sets using the K identities, respectively; the K data sets are transmitted simultaneously or in parallel.
As an embodiment, the first cell is any one cell within a service area (SERVICE AREA) of the first service, and the first cell sends the K data sets by applying the K identities respectively; the K data sets are transmitted simultaneously or in parallel.
As an embodiment, the first signaling indicates a traffic identity of the first traffic, the traffic identity of the first traffic being one of a TMGI (Temporary Mobile Group Identity ) or a source IP address.
As an embodiment, the first signaling indicates a first session of the first service; the K data sets of the first service belong to the first session.
As a sub-embodiment of this embodiment, the first session comprises a PDU session.
As a sub-embodiment of this embodiment, the first session comprises an MBS PDU session.
As a sub-embodiment of this embodiment, the first session comprises a 5MBS PDU session.
As a sub-embodiment of this embodiment, the first session comprises an MBMS PDU session.
As a sub-embodiment of this embodiment, the first session comprises MBS distribution session.
As an embodiment, the first node receives the first traffic using only the target identity.
As an embodiment, the first node receives only the target data set of the K data sets.
As an embodiment, the K data sets are different from each other.
As an embodiment, the first service is an application layer service.
As an embodiment, the first set of identities belongs to the same serving cell.
As an embodiment, the first set of identities is configured by the same serving cell.
As an embodiment, the physical channel carrying the first service includes PDSCH (Physical Downlink SHARED CHANNEL ).
As an embodiment, the physical channel carrying the first traffic includes a PSSCH (PHYSICAL SIDELINK SHARED CHANNEL ).
As an embodiment, the physical channel carrying the first traffic uses a first sequence scrambling.
As a sub-embodiment of this embodiment, the first sequence is an identity of the first set of identities.
As a sub-embodiment of this embodiment, the first sequence is identities in the first set of identities, each identity in the first set of identities being a group common RNTI.
As a sub-embodiment of this embodiment, the first sequence is generated by a group common RNTI.
As a sub-embodiment of this embodiment, the first sequence is a pseudo-random sequence and the first identity is used as an input parameter for generating the pseudo-random sequence.
As a sub-embodiment of this embodiment, the first sequence is a Gold sequence.
As one embodiment, the physical channel carrying the target data set is scrambled using a second sequence.
As a sub-embodiment of this embodiment, the second sequence is the target identity.
As a sub-embodiment of this embodiment, the target identity is a group common RNTI.
As a sub-embodiment of this embodiment, the second sequence is generated by a group common RNTI.
As a sub-embodiment of this embodiment, the second sequence is a pseudo-random sequence, and the target identity is used as an input parameter for generating the pseudo-random sequence.
As a sub-embodiment of this embodiment, the second sequence is a Gold sequence.
As an embodiment, the first control channel indicates time-frequency resources of a physical layer channel carrying said first traffic.
As a sub-embodiment of this embodiment, the physical channel carrying the first traffic comprises PDSCH.
As a sub-embodiment of this embodiment, the physical channel carrying the first traffic comprises a PSSCH.
As a sub-embodiment of this embodiment, the first control channel comprises PDCCH (Physical Downlink Control Channel,).
As a sub-embodiment of this embodiment, the first Control Channel comprises a PSCCH (PHYSICAL SIDELINK Control Channel).
As a sub-embodiment of this embodiment, the first control channel is used for scheduling the first traffic.
As a sub-embodiment of this embodiment, the first control channel carries DCI (Downlink Contro Information, downlink control information).
As a sub-embodiment of this embodiment, the first control channel carries SCI (Sidelink Contro Information, sidelink control information); the SCI indicates time-frequency resources occupied by the physical layer channel carrying the first service.
As a sub-embodiment of this embodiment, the first control channel carries DCI indicating time-frequency resources occupied by the physical layer channel carrying the first service.
As a sub-embodiment of this embodiment, the first control channel uses identity scrambling in the first set of identities.
As a sub-embodiment of this embodiment, the CRC (Cyclic Redundancy Check ) of the first control channel uses identity scrambling in the first set of identities.
As an embodiment, the second control channel indicates time-frequency resources of a physical layer channel carrying the target data set.
As a sub-embodiment of this embodiment, the physical channel carrying the target data set comprises PDSCH.
As a sub-embodiment of this embodiment, the physical channel carrying the target data set comprises a PSSCH.
As a sub-embodiment of this embodiment, the second control channel comprises PDCCH (Physical Downlink Control Channel,).
As a sub-embodiment of this embodiment, the second Control Channel comprises a PSCCH (PHYSICAL SIDELINK Control Channel).
As a sub-embodiment of this embodiment, the second control channel is used to schedule the physical channel carrying the target data set.
As a sub-embodiment of this embodiment, the second control channel is used to schedule MAC PDUs carrying the target data set.
As a sub-embodiment of this embodiment, the second control channel carries DCI (Downlink Contro Information, downlink control information).
As a sub-embodiment of this embodiment, the second control channel carries SCI (Sidelink Contro Information, sidelink control information); the SCI indicates time-frequency resources occupied by the physical layer channel carrying the target data set.
As a sub-embodiment of this embodiment, the second control channel carries DCI indicating time-frequency resources occupied by the physical layer channel carrying the target data set.
As a sub-embodiment of this embodiment, the second control channel uses the target identity scrambling.
As a sub-embodiment of this embodiment, the CRC (Cyclic Redundancy Check ) used by the second control channel uses the target identity scrambling.
As an embodiment, the location of the first node is used to determine the target identity.
As an embodiment, the position of the first node of the sentence is used to determine that the target identity comprises the following meanings: and the first node directly obtains the target identity through the current position.
As an embodiment, the position of the first node of the sentence is used to determine that the target identity comprises the following meanings: and the first node determines the area or the geographical area to which the current position belongs through the current position, and obtains the target identity through the area or the geographical area.
As an embodiment, the position of the first node of the sentence is used to determine that the target identity comprises the following meanings: the first node reports the position information of the first node to a serving cell of the first node, and the serving cell of the first node determines the target identity according to the position information of the first node.
As an embodiment, the position of the first node of the sentence is used to determine that the target identity comprises the following meanings: the position of the first node comprises at least one coordinate value in a specific geographic coordinate system, and the identity in the first identity set has a mapping relation with the coordinate value of the first node.
As an embodiment, the position of the first node of the sentence is used to determine that the target identity comprises the following meanings: the location of the first node comprises at least one coordinate value in a particular geographic coordinate system, the identities in the first set of identities comprising at least a portion of bits of the coordinate value of the first node; and determining the target identity through the at least part of bits.
As an embodiment, the position of the first node of the sentence is used to determine that the target identity comprises the following meanings: the location of the first node comprises at least one coordinate value in a specific geographical coordinate system, the coordinate value comprising at least part of the bits of the identities in the first set of identities, the target identity being determined by the comprising at least part of the bits of the identities in the first set of identities.
As an embodiment, the position of the first node of the sentence is used to determine that the target identity comprises the following meanings: the identity of the geographical area to which the location of the first node belongs and the identities in the first set of identities comprise at least partially identical bits; the at least partially identical bits are used to determine the target identity.
As an embodiment, the position of the first node of the sentence is used to determine that the target identity comprises the following meanings: USD (User Service Description) of the first service includes a mapping relationship between a location of the first node and the target identity.
As an embodiment, the position of the first node of the sentence is used to determine that the target identity comprises the following meanings: USD (User Service Description) of the first service includes a mapping relationship between an area to which the location of the first node belongs and the target identity.
As an embodiment, the position of the first node of the sentence is used to determine that the target identity comprises the following meanings: the location of the first node is determined by TA (Timing Advance) from the first node to a serving cell, and a mapping relationship exists between the TA from the first node to the serving cell and the identities in the first identity set for determining the target identity.
As an embodiment, the first signaling indicates a first set of areas, the first set of areas comprising K areas, the K areas of the first set of areas being associated with the K identities in the first set of identities, respectively; the first set of regions and the location of the first node are used together to determine the target identity.
As a sub-embodiment of this embodiment, the K areas of the first set of areas are respectively in one-to-one correspondence with the K identities in the first set of identities.
As a sub-embodiment of this embodiment, the K areas of the first set of areas are mapped one-to-one with the K identities in the first set of identities, respectively.
As a sub-embodiment of this embodiment, each region of the first set of regions is a sub-region (sub-area) of the first set of regions; the first signaling includes identities (sub area IDs) of K areas of the first set of areas.
As a sub-embodiment of this embodiment, the first signaling comprises an identity (area ID) of the first set of areas.
As a sub-embodiment of this embodiment, the first signaling comprises identities of the K regions of the first set of regions.
As a sub-embodiment of this embodiment, the first signaling indicates coordinates of the K regions in the first set of regions; the location of the first node belongs to one region of the first set of regions.
As an embodiment, the sentence said applying the target identity to receive the target data set comprises the following meanings: the target identity is a search space identity, the first node searches/monitors/blindly detects/receives a first physical control channel in a search space identified by the target identity, the first physical control channel comprises a PDCCH, DCI carried by the first physical control channel indicates time-frequency resources of the first physical channel, and the first physical channel carries the target data set.
As an embodiment, the sentence said applying the target identity to receive the target data set comprises the following meanings: the target identity is a search space identity, the first node searches/listens/blindly detects/receives a first physical control channel in a search space identified by the target identity, the first physical control channel comprises a PSCCH, SCI carried by the first physical control channel indicates time-frequency resources of the first physical channel, and the first physical channel carries the target data set.
As an embodiment, the sentence said applying the target identity to receive the target data set comprises the following meanings: the target identity is a group common RNTI, and the first node performs monitoring or blind detection for the target identity to receive a corresponding DCI indicating time-frequency resources of a first physical channel carrying the target data set.
As an embodiment, the sentence said applying the target identity to receive the target data set comprises the following meanings: the target identity is a group common RNTI, and the first node performs monitoring or blind detection for the target identity to receive a corresponding SCI indicating time-frequency resources of a first physical channel carrying the target data set.
As an embodiment, the sentence said applying the target identity to receive the target data set comprises the following meanings: the target identity is a group public RNTI, the first node blindly detects a second physical control channel using the target identity, the second physical control channel is scrambled using the target identity, the second physical control channel carries a second DCI, the second DCI indicates a time-frequency resource of the second physical channel, and the second physical channel carries the target data set; the second physical channel includes a PDSCH.
As an embodiment, the sentence said applying the target identity to receive the target data set comprises the following meanings: the target identity is a logical channel identity, the first node receives a logical channel identified by the target identity, and the logical channel identified by the target identity carries the target data set.
As an embodiment, the sentence said applying the target identity to receive the target data set comprises the following meanings: the target identity is a logical channel identity, the first node assembles (Reassemble) data of a logical channel identified by the target identity and then passes to an upper layer, the logical channel identified by the target identity carrying the target data set.
As an embodiment, the sentence said applying the target identity to receive the target data set comprises the following meanings: the target identity is a logical channel identity, and the first node discards (discard) data of logical channels belonging to the first service other than the logical channels identified by the target identity.
As an embodiment, the sentence said applying the target identity to receive the target data set comprises the following meanings: the target identity is a radio bearer identity, and the first node receives a radio bearer identified by the target identity.
As an embodiment, the sentence said applying the target identity to receive the target data set comprises the following meanings: the target identity is a radio bearer identity, and the first node ignores or discards radio bearers of the first node other than the radio bearer identified by the target identity.
Example 2
Embodiment 2 illustrates a schematic diagram of a network architecture according to the present application, as shown in fig. 2.
Fig. 2 illustrates a diagram of a network architecture 200 of a 5g nr, LTE (Long-Term Evolution) and LTE-a (Long-Term Evolution Advanced, enhanced Long-Term Evolution) system. The 5G NR or LTE network architecture 200 may be referred to as 5GS (5G System)/EPS (Evolved PACKET SYSTEM) 200, or some other suitable terminology. The 5GS/EPS200 may include one or more UEs (User Equipment) 201, ng-RAN (next generation radio access network) 202,5GC (5G Core Network)/EPC (Evolved Packet Core, evolved packet core) 210, hss (Home Subscriber Server )/UDM (Unified DATA MANAGEMENT) 220, and internet service 230. The 5GS/EPS may interconnect with other access networks, but these entities/interfaces are not shown for simplicity. As shown, 5GS/EPS provides packet switched services, however, those skilled in the art will readily appreciate that the various concepts presented throughout this disclosure may be extended to networks providing circuit switched services or other cellular networks. The NG-RAN includes NR node bs (gnbs) 203 and other gnbs 204. The gNB203 provides user and control plane protocol termination towards the UE 201. The gNB203 may be connected to other gnbs 204 via an Xn interface (e.g., backhaul). The gNB203 may also be referred to as a base station, a base transceiver station, a radio base station, a radio transceiver, a transceiver function, a Basic Service Set (BSS), an Extended Service Set (ESS), a TRP (transmit receive node), or some other suitable terminology. The gNB203 provides the UE201 with an access point to the 5GC/EPC210. Examples of UE201 include a cellular telephone, a smart phone, a Session Initiation Protocol (SIP) phone, a laptop, a Personal Digital Assistant (PDA), a satellite radio, a non-terrestrial base station communication, a satellite mobile communication, a global positioning system, a multimedia device, a video device, a digital audio player (e.g., MP3 player), a camera, a game console, an drone, an aircraft, a narrowband internet of things device, a machine-type communication device, a land-based vehicle, an automobile, a wearable device, or any other similar functional device. Those of skill in the art may also refer to the UE201 as a mobile station, a subscriber station, a mobile unit, a subscriber unit, a wireless unit, a remote unit, a mobile device, a wireless communication device, a remote device, a mobile subscriber station, an access terminal, a mobile terminal, a wireless terminal, a remote terminal, a handset, a user agent, a mobile client, a client, or some other suitable terminology. gNB203 is connected to 5GC/EPC210 through an S1/NG interface. The 5GC/EPC210 includes MME (Mobility MANAGEMENT ENTITY )/AMF (Authentication MANAGEMENT FIELD, authentication management domain)/SMF (Session Management Function ) 211, other MME/AMF/SMF214, S-GW (SERVICE GATEWAY, serving gateway)/UPF (User Plane Function, user plane functions) 212 and P-GW (PACKET DATE Network Gateway)/UPF 213. The MME/AMF/SMF211 is a control node that handles signaling between the UE201 and the 5GC/EPC210. In general, the MME/AMF/SMF211 provides bearer and connection management. All user IP (Internet Protocal, internet protocol) packets are transported through the S-GW/UPF212, which S-GW/UPF212 itself is connected to the P-GW/UPF213. The P-GW provides UE IP address assignment as well as other functions. The P-GW/UPF213 is connected to the internet service 230. Internet services 230 include operator-corresponding internet protocol services, which may include, in particular, the internet, intranets, IMS (IP Multimedia Subsystem ) and packet-switched streaming services.
As an embodiment, the UE201 corresponds to the first node in the present application.
As one embodiment, the UE201 supports transmissions in a non-terrestrial network (NTN).
As an embodiment, the UE201 supports transmissions in a large latency difference network.
As an embodiment, the UE201 supports V2X transmission.
As an embodiment, the UE201 supports MBS transmissions.
As an embodiment, the UE201 supports MBMS transmission.
As an embodiment, the gNB203 corresponds to the second node in the present application.
As an embodiment, the gNB203 supports transmissions in a non-terrestrial network (NTN).
As an embodiment, the gNB203 supports transmissions in a large latency difference network.
As an embodiment, the gNB203 supports V2X transmissions.
As an embodiment, the gNB203 supports MBS transmissions.
As an embodiment, the gNB203 supports MBMS transmission.
Example 3
Embodiment 3 shows a schematic diagram of an embodiment of a radio protocol architecture of a user plane and a control plane according to the application, as shown in fig. 3. Fig. 3 is a schematic diagram illustrating an embodiment of a radio protocol architecture for a user plane 350 and a control plane 300, fig. 3 shows the radio protocol architecture for the control plane 300 for a first node (UE, satellite or aerial in gNB or NTN) and a second node (gNB, satellite or aerial in UE or NTN), or between two UEs, in three layers: layer 1, layer 2 and layer 3. Layer 1 (L1 layer) is the lowest layer and implements various PHY (physical layer) signal processing functions. The L1 layer will be referred to herein as PHY301. Layer 2 (L2 layer) 305 is above PHY301 and is responsible for the links between the first node and the second node and the two UEs through PHY301. The L2 layer 305 includes a MAC (Medium Access Control ) sublayer 302, an RLC (Radio Link Control, radio link layer control protocol) sublayer 303, and a PDCP (PACKET DATA Convergence Protocol ) sublayer 304, which terminate at the second node. The PDCP sublayer 304 provides multiplexing between different radio bearers and logical channels. The PDCP sublayer 304 also provides security by ciphering the data packets and handover support for the first node between second nodes. The RLC sublayer 303 provides segmentation and reassembly of upper layer data packets, retransmission of lost data packets, and reordering of data packets to compensate for out of order reception due to HARQ. The MAC sublayer 302 provides multiplexing between logical and transport channels. The MAC sublayer 302 is also responsible for allocating the various radio resources (e.g., resource blocks) in one cell among the first nodes. The MAC sublayer 302 is also responsible for HARQ operations. The RRC (Radio Resource Control ) sublayer 306 in layer 3 (L3 layer) in the control plane 300 is responsible for obtaining radio resources (i.e., radio bearers) and configuring the lower layers using RRC signaling between the second node and the first node. The radio protocol architecture of the user plane 350 includes layer 1 (L1 layer) and layer 2 (L2 layer), the radio protocol architecture for the first node and the second node in the user plane 350 is substantially the same for the physical layer 351, PDCP sublayer 354 in the L2 layer 355, RLC sublayer 353 in the L2 layer 355 and MAC sublayer 352 in the L2 layer 355 as the corresponding layers and sublayers in the control plane 300, but the PDCP sublayer 354 also provides header compression for upper layer packets to reduce radio transmission overhead. Also included in the L2 layer 355 in the user plane 350 is an SDAP (SERVICE DATA Adaptation Protocol ) sublayer 356, the SDAP sublayer 356 being responsible for mapping between QoS flows and data radio bearers (DRBs, data Radio Bearer) to support diversity of traffic. Although not shown, the first node may have several upper layers above the L2 layer 355. Further included are a network layer (e.g., IP layer) terminating at the P-GW on the network side and an application layer terminating at the other end of the connection (e.g., remote UE, server, etc.).
As an embodiment, the radio protocol architecture in fig. 3 is applicable to the first node in the present application.
As an embodiment, the radio protocol architecture in fig. 3 is applicable to the second node in the present application.
As an embodiment, the first signaling in the present application is generated in the RRC306 or NAS (Non-Access Stratum) layer.
As an embodiment, the K data sets in the present application are generated at the PHY351 or the MAC352 or RLC353 or PDCP354 or SDAP356 or higher layers.
As an embodiment, the first message in the present application is generated in the RRC306 or NAS (Non-Access Stratum) layer.
As an embodiment, the second signaling in the present application is generated in the RRC306 or NAS (Non-Access Stratum) layer.
As an embodiment, the first information in the present application is generated in the PHY301 or MAC302 or RRC306 or NAS (Non-Access Stratum) layer.
Example 4
Embodiment 4 shows a schematic diagram of a first communication device and a second communication device according to the application, as shown in fig. 4. Fig. 4 is a block diagram of a first communication device 450 and a second communication device 410 communicating with each other in an access network.
The first communication device 450 includes a controller/processor 459, a memory 460, a data source 467, a transmit processor 468, a receive processor 456, a multi-antenna transmit processor 457, a multi-antenna receive processor 458, a transmitter/receiver 454, and an antenna 452.
The second communication device 410 includes a controller/processor 475, a memory 476, a receive processor 470, a transmit processor 416, a multi-antenna receive processor 472, a multi-antenna transmit processor 471, a transmitter/receiver 418, and an antenna 420.
In the transmission from the second communication device 410 to the first communication device 450, upper layer data packets from the core network are provided to a controller/processor 475 at the second communication device 410. The controller/processor 475 implements the functionality of the L2 layer. In the transmission from the second communication device 410 to the first communication device 450, a controller/processor 475 provides header compression, encryption, packet segmentation and reordering, multiplexing between logical and transport channels, and radio resource allocation to the first communication device 450 based on various priority metrics. The controller/processor 475 is also responsible for retransmission of lost packets and signaling to the first communication device 450. The transmit processor 416 and the multi-antenna transmit processor 471 implement various signal processing functions for the L1 layer (i.e., physical layer). Transmit processor 416 performs coding and interleaving to facilitate Forward Error Correction (FEC) at the second communication device 410, as well as mapping of signal clusters based on various modulation schemes, e.g., binary Phase Shift Keying (BPSK), quadrature Phase Shift Keying (QPSK), M-phase shift keying (M-PSK), M-quadrature amplitude modulation (M-QAM). The multi-antenna transmit processor 471 digitally space-precodes the coded and modulated symbols, including codebook-based precoding and non-codebook-based precoding, and beamforming processing, to generate one or more spatial streams. A transmit processor 416 then maps each spatial stream to a subcarrier, multiplexes with reference signals (e.g., pilots) in the time and/or frequency domain, and then uses an Inverse Fast Fourier Transform (IFFT) to generate a physical channel carrying the time domain multicarrier symbol stream. The multi-antenna transmit processor 471 then performs transmit analog precoding/beamforming operations on the time domain multi-carrier symbol stream. Each transmitter 418 converts the baseband multicarrier symbol stream provided by the multiple antenna transmit processor 471 to a radio frequency stream and then provides it to a different antenna 420.
In a transmission from the second communication device 410 to the first communication device 450, each receiver 454 receives a signal at the first communication device 450 through its respective antenna 452. Each receiver 454 recovers information modulated onto a radio frequency carrier and converts the radio frequency stream into a baseband multicarrier symbol stream that is provided to a receive processor 456. The receive processor 456 and the multi-antenna receive processor 458 implement various signal processing functions for the L1 layer. A multi-antenna receive processor 458 performs receive analog precoding/beamforming operations on the baseband multi-carrier symbol stream from the receiver 454. The receive processor 456 converts the baseband multicarrier symbol stream after receiving the analog precoding/beamforming operation from the time domain to the frequency domain using a Fast Fourier Transform (FFT). In the frequency domain, the physical layer data signal and the reference signal are demultiplexed by the receive processor 456, wherein the reference signal is to be used for channel estimation, and the data signal is subjected to multi-antenna detection in the multi-antenna receive processor 458 to recover any spatial stream destined for the first communication device 450. The symbols on each spatial stream are demodulated and recovered in a receive processor 456 and soft decisions are generated. The receive processor 456 then decodes and deinterleaves the soft decisions to recover the upper layer data and control signals that were transmitted by the second communication device 410 on the physical channel. The upper layer data and control signals are then provided to the controller/processor 459. The controller/processor 459 implements the functions of the L2 layer. The controller/processor 459 may be associated with a memory 460 that stores program codes and data. Memory 460 may be referred to as a computer-readable medium. In the transmission from the second communication device 410 to the second communication device 450, the controller/processor 459 provides demultiplexing between transport and logical channels, packet reassembly, decryption, header decompression, control signal processing to recover upper layer data packets from the core network. The upper layer packets are then provided to all protocol layers above the L2 layer. Various control signals may also be provided to L3 for L3 processing.
In the transmission from the first communication device 450 to the second communication device 410, a data source 467 is used at the first communication device 450 to provide upper layer data packets to a controller/processor 459. Data source 467 represents all protocol layers above the L2 layer. Similar to the transmit functions at the second communication device 410 described in the transmission from the second communication device 410 to the first communication device 450, the controller/processor 459 implements header compression, encryption, packet segmentation and reordering, and multiplexing between logical and transport channels based on radio resource allocations, implementing L2 layer functions for the user and control planes. The controller/processor 459 is also responsible for retransmission of lost packets and signaling to the second communication device 410. The transmit processor 468 performs modulation mapping, channel coding, and digital multi-antenna spatial precoding, including codebook-based precoding and non-codebook-based precoding, and beamforming, with the multi-antenna transmit processor 457 performing digital multi-antenna spatial precoding, after which the transmit processor 468 modulates the resulting spatial stream into a multi-carrier/single-carrier symbol stream, which is analog precoded/beamformed in the multi-antenna transmit processor 457 before being provided to the different antennas 452 via the transmitter 454. Each transmitter 454 first converts the baseband symbol stream provided by the multi-antenna transmit processor 457 into a radio frequency symbol stream and provides it to an antenna 452.
In the transmission from the first communication device 450 to the second communication device 410, the function at the second communication device 410 is similar to the receiving function at the first communication device 450 described in the transmission from the second communication device 410 to the first communication device 450. Each receiver 418 receives radio frequency signals through its corresponding antenna 420, converts the received radio frequency signals to baseband signals, and provides the baseband signals to a multi-antenna receive processor 472 and a receive processor 470. The receive processor 470 and the multi-antenna receive processor 472 collectively implement the functions of the L1 layer. The controller/processor 475 implements L2 layer functions. The controller/processor 475 may be associated with a memory 476 that stores program codes and data. Memory 476 may be referred to as a computer-readable medium. In the transmission from the first communication device 450 to the second communication device 410, a controller/processor 475 provides demultiplexing between transport and logical channels, packet reassembly, decryption, header decompression, control signal processing to recover upper layer data packets from the UE 450. Upper layer packets from the controller/processor 475 may be provided to the core network.
As an embodiment, the first communication device 450 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus of the first communication device 450 to at least: receiving first signaling, wherein the first signaling is used for indicating a first identity set of a first service, the first service is a non-unicast service, and the first identity set comprises a plurality of identities; determining a target identity; receiving the target data set by applying the target identity; wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the first node is used to determine the target identity.
As an embodiment, the first communication device 450 includes: a memory storing a program of computer-readable instructions that, when executed by at least one processor, produce acts comprising: receiving first signaling, wherein the first signaling is used for indicating a first identity set of a first service, the first service is a non-unicast service, and the first identity set comprises a plurality of identities; determining a target identity; receiving the target data set by applying the target identity; wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the first node is used to determine the target identity.
As an embodiment, the second communication device 410 apparatus includes: at least one processor and at least one memory including computer program code; the at least one memory and the computer program code are configured for use with the at least one processor. The second communication device 410 means at least: transmitting first signaling, wherein the first signaling is used for indicating a first identity set of a first service, the first service is a non-unicast service, and the first identity set comprises a plurality of identities; a receiver of the first signaling determines a target identity and receives the target data set using the target identity; wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the recipient of the first signaling is used to determine the target identity.
As an embodiment, the second communication device 410 apparatus includes: a memory storing a program of computer-readable instructions that, when executed by at least one processor, produce acts comprising: transmitting first signaling, wherein the first signaling is used for indicating a first identity set of a first service, the first service is a non-unicast service, and the first identity set comprises a plurality of identities; a receiver of the first signaling determines a target identity and receives the target data set using the target identity; wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the recipient of the first signaling is used to determine the target identity.
As an embodiment, the first communication device 450 corresponds to a first node in the present application.
As an embodiment, the second communication device 410 corresponds to a second node in the present application.
As an embodiment, the first communication device 450 is a UE.
As an embodiment, the first communication device 450 is an in-vehicle terminal.
As an embodiment, the second communication device 450 is a relay.
As an example, the second communication device 450 is a satellite.
As an embodiment, the second communication device 410 is a base station.
As an embodiment, the second communication device 410 is a relay.
As an embodiment, the second communication device 410 is a UE.
As an example, the second communication device 410 is a satellite.
As an example, a receiver 456 (including an antenna 460), a receive processor 452 and a controller/processor 490 are used in the present application to receive the first signaling.
As one example, a receiver 456 (including an antenna 460), a receive processor 452 and a controller/processor 490 are used in the present application to receive the target data set.
As an example, a receiver 456 (including an antenna 460), a receive processor 452 and a controller/processor 490 are used in the present application to receive the second signaling.
As an example, a receiver 456 (including an antenna 460), a receive processor 452 and a controller/processor 490 are used in the present application to receive the first information.
As one example, transmitter 456 (including antenna 460), transmit processor 455 and controller/processor 490 are used in the present application to transmit the first message.
As an example, the transmitter 416 (including the antenna 420), the transmit processor 412 and the controller/processor 440 are used in the present application to transmit the first signaling.
As one example, transmitter 416 (including antenna 420), transmit processor 412 and controller/processor 440 are used to transmit the K data sets in the present application.
As an example, the transmitter 416 (including the antenna 420), the transmit processor 412 and the controller/processor 440 are used in the present application to send the second signaling.
As one example, transmitter 416 (including antenna 420), transmit processor 412 and controller/processor 440 are used in the present application to transmit the first information.
As an example, receiver 416 (including antenna 420), receive processor 412 and controller/processor 440 are used in the present application to receive the first message.
Example 5
Embodiment 5 illustrates a wireless signal transmission flow diagram according to one embodiment of the application, as shown in fig. 5. In fig. 5, U01 corresponds to a first node of the present application, N02 corresponds to a second node of the present application, and it is specifically illustrated that the order in this example is not limited to the order of signal transmission and implementation in the present application, and steps in F51 are optional.
For the first node U01, receiving a first signaling in step S5101; receiving first information in step S5102; transmitting a first message in step S5103; receiving a second signaling in step S5104; the target data set is received in step S5105.
For the second node N02, sending a first signaling in step S5201; transmitting the first information in step S5202; receiving a first message in step S5203; transmitting a second signaling in step S5204; in step S5205, K data sets are transmitted.
In embodiment 5, the first signaling is used to indicate a first set of identities of a first service, the first service being a non-unicast service, the first set of identities comprising a plurality of identities; determining a target identity; receiving the target data set by applying the target identity; the first service comprises K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the first node U01 is used to determine the target identity.
As an embodiment, the first node U01 is a UE.
As an embodiment, the first node U01 is a relay.
As an embodiment, the second node N02 is a UE.
As an embodiment, the second node N02 is a base station.
As an embodiment, the second node N02 is a serving cell of the first node U01.
As an embodiment, the second node N02 is a cell group of the first node U01.
As an embodiment, the second node N02 is a primary serving cell (PCell) of the first node U01.
As an embodiment, the second node N02 is a secondary serving cell (SCell) of the first node U01.
As an embodiment, the second node N02 is a SpCell of the first node U01.
As an embodiment, the interface of the second node N02 communicating with the first node U01 includes Uu.
As an embodiment, the interface of the second node N02 to the first node U01 includes a PC5.
As an embodiment, the second node N02 is a Source Cell or a destination Cell (TARGET CELL) of the first node U01.
As an embodiment, the first node U01 is located in a service area of the first service.
As a sub-embodiment of this embodiment, the first node U01 is necessarily within a sub-region of the first traffic, which corresponds to one of the K data sets.
As a sub-embodiment of this embodiment, the first node U01 determines, through the USD of the first service and the service area of the first service indicated by the broadcast message sent by the first node U01, that the first node U01 is located in the service area of the first service.
As a sub-embodiment of this embodiment, the service area of the first service is indicated by a service area identity (SAI, service Area Identity).
As an embodiment, the first node U01 joins the multicast group of the first service.
As an embodiment, the first signaling includes signaling during the first node U01 joining the multicast group of the first service.
As an embodiment, the first signaling comprises NAS signaling.
As one embodiment, the first information is used to indicate K1 search spaces; each identity of the first set of identities is a group common RNTI; each K identities of the first set of identities is associated with one of the K1 search spaces, where K1 is a positive integer no greater than K.
As an embodiment, the first signaling includes the first information.
As an embodiment, the first information comprises an RRC message.
As an embodiment, the first information includes a MAC CE (Control Element).
As one embodiment, the first information includes DCI.
As an embodiment, the first information comprises SCI.
As an embodiment, the first information indicates an identity or index of the K1 search spaces.
As one example, K1 is equal to K.
As an embodiment, the first information is sent by unicast.
As an embodiment, the first information is sent by means of broadcasting or multicasting.
As an embodiment, the first information is sent over a different radio bearer than the K data sets.
As an embodiment, the first message is used to indicate at least one of location information or a first area identity of the first node U01; the location information of the first node U01 is used to determine the first area identity.
As a sub-embodiment of this embodiment, the first region identity is used to identify the first region.
As a sub-embodiment of this embodiment, the first node U01 is located within the first area.
As a sub-embodiment of this embodiment, the location information of the first node U01 indicates that the first node U01 is located within the first area.
As a sub-embodiment of this embodiment, the first area belongs to a service area of the first service.
As a sub-embodiment of this embodiment, the first area is an area within a service area of the first service.
As a sub-embodiment of this embodiment, the service area of the first service includes K areas, and the first area is one of the K areas, and the K areas are in one-to-one correspondence with the K data sets.
As a sub-embodiment of this embodiment, the location information of the first node U01 may uniquely determine to which of the K areas the location of the first node U01 belongs.
As a sub-embodiment of this embodiment, the first signaling indicates a first set of regions, the first set of regions comprising the K regions.
As an embodiment, the first message comprises an RRC message.
As an embodiment, the first message comprises a NAS message.
As an embodiment, the first message comprises RRCSetupRequest messages.
As an embodiment, the first message comprises RRCResumeRequest messages.
As an embodiment, the first message includes UEAssistanceInformation.
As an embodiment, the first message includes InterestIndication.
As an embodiment, the first message includes MBMSInterestIndication.
As an embodiment, the first message includes MBSInterestIndication.
As an embodiment, the first message includes ulinfomation transfer.
As an embodiment, the first message includes ULInformationTransferMRDC.
As an embodiment, the first message includes UEInformationResponse.
As an embodiment, the first message includes UECapabilityInformation.
As an embodiment, the first message includes RRCReconfigurationComplete.
As an embodiment, the first message includes SCGFailureInformation.
As an embodiment, the first message includes MCGFailureInformation.
As an embodiment, the first message includes LocationMeasurementIndication.
As an embodiment, the second signaling indicates the target identity.
As an embodiment, the first signaling comprises the second signaling.
As an embodiment, the first signaling comprises at least part of a domain of the second signaling.
As an embodiment, the first signaling and the second signaling are different signaling.
As an embodiment, the first signaling and the second signaling are different RRC signaling.
As an embodiment, the second signaling includes RRCReconfiguration.
As an embodiment, the second signaling includes at least part of the fields in RRCReconfiguration.
As an embodiment, the second signaling includes RRCConnectionReconfiguration.
As an embodiment, the second signaling includes RRCRELEASE.
As an embodiment, the second signaling is sent by unicast.
As an embodiment, the physical channel occupied by the second signaling includes PDSCH.
As an embodiment, the first message is used to trigger the second signaling.
As an embodiment, the Physical channel occupied by the first message includes PUSCH (Physical Uplink SHARED CHANNEL ).
As an embodiment, the first signaling indicates a first set of areas, the first set of areas comprising K areas, the K areas of the first set of areas being associated with the K identities in the first set of identities, respectively; the first set of regions and the location of the first node U01 are used together to determine the target identity.
As a sub-embodiment of this embodiment, the first node U01 sends the first message, the first message indicating the first zone identity; the location of the first node U01 is used to determine the first zone identity.
As a sub-embodiment of this embodiment, the first node U01 sends the first message, the first message indicating the target identity; the location of the first node U01 is used to determine the first zone identity; the first region identity corresponds to the target identity.
As a sub-embodiment of this embodiment, the first node U01 sends a second message indicating the target identity. The location of the first node U01 belongs to one of the K areas, and an area in the first set of areas to which the location of the first node U01 belongs is a target area, where the target area corresponds to the target identity in the first set of identities, and the target area in the first set of areas corresponds to the target identity in the first set of identities one to one or one to one.
As a sub-embodiment of this embodiment, the recipient of the two messages is the second node N02.
As a sub-embodiment of this embodiment, the second node N02 sends a second configuration message, and the first node U01 receives the second configuration message; the second configuration message indicates a first RNTI; the first RNTI is a C-RNTI; the first RNTI is used for scrambling a third physical channel that transmits the first service; the first RNTI is used to scramble and schedule a PDCCH channel of the third physical channel.
As a sub-embodiment of this embodiment, the third physical channel is a PDSCH channel, the third physical channel being for carrying the target data set.
As a sub-embodiment of this embodiment, the third physical channel is only used to carry the target data set of the K data sets.
As a sub-embodiment of this embodiment, the second message is used to trigger the second configuration message.
As a sub-embodiment of this embodiment, the first node U01 performs blind detection using the first RNTI.
As a sub-embodiment of this embodiment, the first node U01 receives the third physical channel.
As a sub-embodiment of this embodiment, the first node U01 receives the target data set.
As a sub-embodiment of this embodiment, the second configuration message comprises an RRC message.
As a sub-embodiment of this embodiment, the second configuration message comprises RRCReconfiguration messages.
As a sub-embodiment of this embodiment, the second configuration message comprises RRCConnectionReconfiguration messages.
As a sub-embodiment of this embodiment, the second configuration message comprises RRCSetup messages.
As a sub-embodiment of this embodiment, the second configuration message comprises RRCResume messages.
As a sub-embodiment of this embodiment, the second configuration message comprises RRCReestablishment messages.
As an embodiment, the above method has the advantage that, after a UE determines the target identity according to its own location, the UE directly indicates the determined target identity to the network, and the network may configure relevant transmission parameters according to the target identity, for example, including G-RNTI or C-RNTI, logical channels or radio bearers or scheduling information, and the network may better support PTP (point-to-point) transmission.
As an embodiment, the first signaling indicates K flows of the first service, the K flows of the first service are in one-to-one correspondence with the K data sets, and the K flows of the first service are mapped onto the same radio bearer.
As a sub-embodiment of this embodiment, the K streams include IP streams.
As a sub-embodiment of this embodiment, the K flows include QoS flows.
As a sub-embodiment of this embodiment, the K streams include MBS streams.
As a sub-embodiment of this embodiment, the K streams comprise multicast streams.
As a sub-embodiment of this embodiment, there is a one-to-one mapping relationship of the K streams to the K data sets.
As a sub-embodiment of this embodiment, receiving one of the K data sets means receiving a flow of the K flows corresponding to the one of the K data sets.
As a sub-embodiment of this embodiment, the K flows of the first service are mapped onto the same radio bearer, and the same radio bearer to which the K flows of the first service are mapped is a third radio bearer; the third radio bearer is a non-unicast bearer.
As a sub-embodiment of this embodiment, the third radio bearer is a multicast bearer.
As a sub-embodiment of this embodiment, the K flows of the first traffic are mapped to be received on the same radio bearer.
As a sub-embodiment of this embodiment, the first node U01 receives the first service using one PDCP entity.
As a sub-embodiment of this embodiment, the second node N02 receives the K flows of the first service using a plurality of PDCP entities.
As a sub-embodiment of this embodiment, any one of the identities in the first set of identities is a group common RNTI.
As a sub-embodiment of this embodiment, any one of the first set of identities is a logical channel identity.
As a sub-embodiment of this embodiment, any of the first set of identities is a search space identity.
As an embodiment, each identity in the first set of identities is a group common RNTI; the first signaling indicates a second set of identities, the second set of identities comprising K identities; the K identities of the second identity set are in one-to-one correspondence with the K identities of the first identity set; any identity in the second set of identities is one of a { logical channel identity, radio bearer identity }; the K data sets of the first service are transmitted simultaneously applying the K identities of the first identity set and the K identities of the second identity set, respectively.
As an embodiment, the first signaling indicates a third set of identities, the third set of identities comprising Kx1 identities; wherein Kx1 is a positive integer; any identity in the third set of identities is a search space identity; the third target identity is one identity of the third set of identities; the third target identity has a mapping relation with the target identity, or the region where the first node U01 is located has a mapping relation with the third target identity; the first node U01 determines the third target identity according to the target identity or the area where the first node U01 is located; the target identity is an identity other than the search space identity; the first node U01 detects PDCCH for scheduling a third target physical channel in a search space marked by the third target identity, wherein the third target physical channel is used for bearing the target data set; the first node U01 receives the third target physical channel.
As an embodiment, the first signaling indicates a fourth set of identities, the fourth set of identities comprising Kx2 identities; wherein Kx2 is a positive integer; any identity in the fourth identity set is a group public RNTI; the fourth target identity is one identity of the fourth set of identities; the mapping relationship exists between the fourth target identity and the target identity, or between the region where the first node U01 is located and the fourth target identity; the first node U01 determines the fourth target identity according to the target identity or the area where the first node is located; the target identity is an identity other than a group public RNTI; the first node U01 detects a fourth PDCCH for scheduling a fourth target physical channel, wherein the fourth target physical channel is used for bearing the target data set; the first node U01 receives the fourth target physical channel, where the fourth target physical channel includes a PDSCH; the fourth PDCCH is scrambled using the fourth target identity.
As an embodiment, the first signaling indicates a fifth set of identities, the fifth set of identities comprising Kx3 identities; wherein Kx3 is a positive integer; any identity in the fifth set of identities is a logical channel identity; the fifth target identity is one identity of the fifth set of identities; a mapping relationship exists between the fifth target identity and the target identity, or a mapping relationship exists between the region where the first node U01 is located and the fifth target identity; the first node U01 determines the fifth target identity according to the target identity or the area where the first node is located; the target identity is an identity other than a logical channel identity; the first node U01 receives a logic channel identified by the fifth target identity; the logical channel identified by the fifth target identity carries the target data set.
As an embodiment, the first signaling indicates a sixth set of identities, the sixth set of identities comprising Kx4 identities; wherein Kx4 is a positive integer; any one of the sixth set of identities is a radio bearer identity; the sixth target identity is one of said sixth set of identities; the mapping relationship exists between the sixth target identity and the target identity, or between the region where the first node U01 is located and the sixth target identity; the first node U01 determines the sixth target identity according to the target identity or the area where the first node U01 is located; the target identity is an identity other than a radio bearer identity; a sixth logical channel for carrying data of the sixth radio bearer; the first node U01 hands data of the sixth radio bearer on the sixth logical channel to a sixth PDCP entity, which corresponds to the sixth radio bearer.
As an embodiment, the location of the first node U01 is used to determine the area where the first node U01 is located.
As one embodiment, the Kx1 is equal to the K.
As one embodiment, the Kx2 is equal to the K.
As one embodiment, the Kx3 is equal to the K.
As one embodiment, the Kx4 is equal to the K.
As an embodiment, the second node N02 sends K data sets, and the first node U01 receives only the target data set.
Example 6
Embodiment 6 illustrates a wireless signal transmission flow diagram according to one embodiment of the application, as shown in fig. 6. In fig. 6, U11 corresponds to a first node of the present application, and N12 corresponds to a second node of the present application, and it is specifically illustrated that the order in this example does not limit the order of signal transmission and implementation in the present application. Example 6 is based on example 5, and reference is made to example 5 for parts of example 6 which are required but not explicitly shown.
For the first node U11, receiving a second set of target data in step S6101; determining a target identity in step S6102; in step S6103, a target data set is received.
For the second node N12, transmitting a second target data set in step S6201; in step S6202, K data sets are transmitted.
As an embodiment, the first node U11 receives a second set of target data using a second target identity before determining the target identity; the second target data set belongs to the first service; the second target identity belongs to the first identity set; the second target identity is different from the target identity.
As an embodiment, the first node U11 resets or releases the RLC entity for receiving the second set of target data in response to determining the target identity.
As an embodiment, the first service includes K flows, the K flows are in one-to-one correspondence with the K data sets, and the target data set corresponds to a target flow of the K flows.
As one embodiment, the second set of target data corresponds/maps/associates with a flow other than the target flow of the K flows.
As an embodiment, the second node N12 transmits a second total set of data simultaneously with the second target set of data, the second total set of data comprising K-1 subsets of data; the K-1 data subsets and the second target data sets are in one-to-one correspondence with the K streams, wherein the second target data sets correspond to second target streams of the K streams, and the K-1 data subsets are in one-to-one correspondence with K-1 streams other than the second target streams of the K streams.
As an embodiment, in step S6102, the first node U11 determines the target identity according to the location of the first node U11.
As an embodiment, the second target identity is a search space identity.
As an embodiment, the second target identity is a group common RNTI.
As an embodiment, the second target identity is a logical channel identity.
As an embodiment, the second target identity is a radio bearer identity.
As an embodiment, the sentence the first node U11 receives the second target data set using the second target identity comprises the following meanings: the second target identity is a search space identity, the first node U11 detects a PDCCH channel in a search space identified by the second target identity, the PDCCH channel detected in the search space identified by the second target identity is used to indicate a time-frequency resource of a first previous physical channel carrying the second target data set, and the first node U11 receives the second target data set by receiving the first previous physical channel.
As an embodiment, the sentence the first node U11 receives the second target data set using the second target identity comprises the following meanings: the second target identity is a group common RNTI, the first node U11 detects a PDCCH channel scrambled with the second target identity, the PDCCH channel scrambled with the second target identity detected by the first node U11 indicates a second previous physical channel carrying the second target data set, and the first node U11 receives the second target data set by receiving the second previous physical channel.
As an embodiment, the sentence the first node U11 receives the second target data set using the second target identity comprises the following meanings: the second target identity is a logical channel identity, a logical channel identified by the second target identity is used to carry the second target data set, and the first node U11 receives the second target data set by receiving the logical channel indicated by the second target identity.
As an embodiment, the sentence the first node U11 receives the second target data set using the second target identity comprises the following meanings: the second target identity is a radio bearer identity, the radio bearer identified by the second target identity being associated with a second target PDCP entity; the target data set is carried by a second target logical channel, and the first node U11 delivers the received data of the second target logical channel to the second target PDCP entity for processing.
As an embodiment, the first node U11 resets (reset) the RLC entity for receiving the second target data set in response to determining the target identity.
As a sub-embodiment of this embodiment, the act of determining the target identity triggers the first node U11 to receive the target data set, receives or prepares to receive the target data set triggers the first node U11 to reset (reset) the RLC entity for receiving the second target data set.
As an embodiment, the first node U11 releases (release) the RLC entity for receiving the second target data set in response to determining the target identity.
As a sub-embodiment of this embodiment, the act of determining the target identity triggers the first node U11 to receive the target data set, and receiving or preparing to receive the target data set triggers the first node U11 to release the RLC entity for receiving the second target data set.
As a sub-embodiment of this embodiment, the first node U11 establishes an RLC entity for receiving the target data set.
Example 7
Embodiment 7 illustrates a schematic diagram of a plurality of regions according to one embodiment of the application, as shown in fig. 7. The cell in fig. 7 includes several areas, including a first area, a second area, and a third area, which may also be named sub-areas or similar terms; in fact, the scene to which the present application is applied does not limit the number of areas, as long as it is more than one. The shapes of the three regions in fig. 7 are different to illustrate that the shapes of the regions may be different, such as a circle or a polygon, and the method proposed by the present application does not limit the shape and size of the regions, and the shape of the regions need not necessarily be a circle, a triangle, a rectangle, or the like. The areas in fig. 7 are discontinuous, which is only one embodiment, and the scene to which the present application is applied is not limited to whether these areas are continuous.
As an embodiment, the first cell is a serving cell of the first node.
As an embodiment, K is equal to 3, i.e. the first service comprises 3 data sets, a first data set, a second data set and a third data set, respectively; the first set of identities includes 3 identities, a first identity, a second identity and a third identity, respectively.
As an embodiment, a first one of the 3 data sets is suitable for the UE of the first region; a second one of the 3 data sets is adapted for use by a UE of the second region; a third one of the 3 data sets is applicable to UEs of the third region.
As an embodiment, a first identity of the first set of identities is associated with the first area; a second identity of the first set of identities is associated with the second area; a third identity of the first set of identities is associated with the third area.
As one embodiment, the first identity of the first set of identities is determined to be the target identity when the first node is located within the first area; determining the second identity of the first set of identities as the target identity when the first node is located within the second area; the third identity of the first set of identities is determined to be the target identity when the first node is located within the third area.
As an embodiment, the first node receives only the first set of data when the first identity of the first set of identities is determined to be the target identity; the first node receiving only the second set of data when the second identity in the first set of identities is determined to be the target identity; the first node receives only the third set of data when the third identity in the first set of identities is determined to be the target identity.
As an embodiment, the service area of the first service includes the first area and the second area and the third area.
As an embodiment, the first message is used to indicate location information of the first node, and the second signaling indicates the target identity.
As an embodiment, the first message includes location information of the first node.
As an embodiment, the first message comprises coordinates of the first node.
As an embodiment, the first message comprises coordinates and a coordinate system of the first node.
As an embodiment, the first message is used to indicate a first area identity of the first node; when the first node is located in the first area, the first area identity is determined as the identity of the first area; when the first node is located in the second area, the first area identity is determined as the identity of the second area; the first zone identity is determined to be the identity of the third zone when the first node is located in the third zone.
As an embodiment, the first message comprises the first zone identity.
As an embodiment, the second signaling indicates the target identity.
As an embodiment, the first signaling indicates a first set of areas, the first set of areas comprising K areas, the K areas of the first set of areas being associated with the K identities in the first set of identities, respectively; the first set of regions and the location of the first node are used together to determine the target identity.
As an embodiment, the first set of regions includes the first region and the second region and the third region.
As an embodiment, the K areas of the first set of areas are mapped one-to-one with the K identities in the first set of identities, respectively.
As an embodiment, the first node indicates the determined target identity to a sender of the first signaling.
As an embodiment, the above method has the advantage that the UE informs the network of its selected area, which can assist the network in configuring the UE in a targeted manner, for example in a mobility management procedure, for example in scheduling, while also facilitating the network to transmit the target data set of the first service to the UE using PTP.
Example 8
Embodiment 8 illustrates a schematic diagram of determining the identity of a target according to one embodiment of the invention, as shown in fig. 8. The first position in fig. 8 is the position of the first node.
As one embodiment, the first set of regions includes K regions; the first set of identities includes K identities.
As an embodiment, the first location belongs to an i-th region in the first set of regions, where the value of i ranges from 1 to K.
As an embodiment, the first location is within the i-th region.
As an embodiment, there is a one-to-one mapping relationship between the areas in the first set of areas and the identities in the first set of identities, from which one area in the first set of areas an identity in the first set of identities mapped to the one area in the first set of areas can be uniquely determined.
As an embodiment, there is a one-to-one correspondence between the data sets in the K data sets and the identities in the first identity set; the application ith identity may receive the ith data set; receiving the ith data set requires application of the ith data set.
As an embodiment, the first signaling indicates the first set of regions.
As an embodiment, the first signaling indicates a mapping or the association of the first set of areas with the first set of identities.
As an embodiment, the USD of the first service indicates a mapping or association of the first set of areas and the first set of identities.
As an embodiment, the USD of the first service indicates a coordinate system for determining the location of the first node.
As an embodiment, the first signaling indicates a mapping or association of the first identity set with the K data sets.
As an embodiment, the first node receives only the ith data set when the first node is located in the ith area.
Example 9
Embodiment 9 illustrates a schematic diagram of a first signaling and target data set transmission according to an embodiment of the present application, as shown in fig. 9. In fig. 9, a first node corresponds to the first node of the present application, and the first node communicates with two nodes, node a and node B, respectively.
As an embodiment, the node a is a cell and the node B is a cell.
As an embodiment, the node a is a serving cell of the first node.
As an embodiment, the node B is a serving cell of the first node.
As an embodiment, the node a is a sender of the first signaling.
As an embodiment, the node B is the sender of the target data set.
As an embodiment, the node B is the sender of the K data sets.
As an embodiment, the node a belongs to an MCG and the node B belongs to an SCG.
As an embodiment, the node a is a MN (master node) and the node B is a SN (secondary node).
As one example, the benefits of the above method include: the related configuration for receiving the target data set is sent by the MCG or the MN, and the service belongs to the other cell, so that the efficiency is improved, and the flexibility is improved; if the cell of the node B is bigger, the method provided by the application can exert the advantage of high efficiency of multicast and multicast coverage, for example, the cell or the cell group of the node B is an NTN cell; if the cell of the node A is bigger, the method provided by the application is beneficial to the node A to carry out unified configuration by utilizing a large coverage area, and the node B transmits service data more relevant to the geographic area.
As an embodiment, the node a is a source cell and the node B is a destination cell (TARGET CELL).
As an embodiment, the above method has the advantage that a UE can receive the configuration of the traffic of the destination cell before or during handover, which is beneficial for the continuity of data reception.
As an embodiment, the node a is a serving cell of the first node, and the node B is a relay of the first node.
As an embodiment, the node B only relays the target data set.
As an embodiment, the first node is a remote UE.
As an embodiment, the first node determines the target identity, which the first node indicates to the node B.
As an embodiment, the node B relays the target data set using the target identity.
As a sub-embodiment of this embodiment, the node B receives the target data set using the target identity.
As a sub-embodiment of this embodiment, the node B forwards the target data set using the target identity.
As a sub-embodiment of this embodiment, the node B forwards the target data set to the first node in unicast.
As an embodiment, the above method has the advantages that one remote UE can receive control information through the serving cell, namely, the node a, which is favorable for unified coordination of the network, and is more reliable, and meanwhile, the node B only needs to relay the data which the remote UE is interested in or needs to receive, which is favorable for reducing redundancy, reducing waste and improving efficiency.
Example 10
Embodiment 10 illustrates a schematic diagram of the identity of a target according to one embodiment of the application, as shown in fig. 10. In fig. 10, the functions within the dashed box are optional.
As an embodiment, the MBS PDU session in fig. 10 is an MBS PDU session of the first service or the first service belongs to the MBS PDU session; the MBS PDU session is a PDU session indicating a multicast service.
As one embodiment, the MBS PDU session includes at least two flows, e.g. Flow1 and Flow2; both the Flow1 and the Flow2 are flows of the first service.
As an embodiment, the Flow1 and the Flow2 are respectively one IP Flow or QoS Flow or Flow of multicast traffic.
As an embodiment, the Flow1 and the Flow2 are mapped to K radio bearers respectively through an SDAP layer, in embodiment 10, K is equal to 2, and the method proposed by the present application does not limit the specific value of K as long as K is an integer greater than 1; the K radio bearers are MRB1 and MRB2, respectively, and the MRB1 and the MRB2 are non-unicast bearers, respectively.
As an embodiment, the first service includes K data sets, where K is equal to 2, a first data set of the K data sets corresponds to the Flow1, and a second data set of the K data sets corresponds to the Flow2; a first one of the K data sets is carried by the MRB 1; a second one of the K data sets is carried by the MRB 2.
As an embodiment, the data carried by the MRB1 enters the RLC layer through the PDCP layer, and is carried through a first logical channel, where the identity of the first logical channel is the first logical channel identity.
As an embodiment, the data carried by the MRB2 enters the RLC layer through the PDCP layer, and is carried through a second logical channel, where the identity of the second logical channel is the second logical channel identity.
As an embodiment, the data of the first logical channel and the data of the second logical channel are multiplexed on a first downlink physical channel through the processing of the MAC layer, the first downlink physical channel is a PDSCH, and the PDCCH of the first downlink physical channel is scheduled to be scrambled using one group common RNTI.
As a sub-embodiment of this embodiment, the target identity is the first logical channel identity, the target data set is the first one of the K data sets, or the target identity is the second logical channel identity, and the target data set is the second one of the K data sets.
As a sub-embodiment of this embodiment, the first signaling indicates the one group common RNTI that schedules the PDCCH of the first downlink physical channel for scrambling.
Example 11
Embodiment 11 illustrates a schematic diagram of the identity of a target according to one embodiment of the application, as shown in fig. 11. In fig. 11, the functions within the dashed box are optional. Fig. 11 shows a protocol structure of the first node side.
As an embodiment, the MBS PDU session in fig. 11 is an MBS PDU session of the first service or the first service belongs to the MBS PDU session; the MBS PDU session is a PDU session indicating a multicast service.
As an embodiment, the area to which the first node belongs is an area i, i.e. the first node is located in the area i.
As an embodiment, the region i belongs to the first set of regions; the data of the first service corresponding to the region i is the ith data set in the K data sets.
As an embodiment, the first signaling is used to indicate the region i.
As an embodiment, the ith data set of the K data sets corresponds to a flow Flowi of the first service, where the Flowi includes an IP flow or QoS flow or MBS flow or multicast flow.
As an embodiment, the first signaling is used to configure MRB1 and a first logical channel, the MRB1 is a non-unicast bearer used to carry the target data set, and the target data set is the i-th data set in the K data sets.
As an embodiment, the target identity is an ith RNTI, the ith RNTI belongs to the first identity set, the first node receives the target data set using the ith RNTI, and the ith RNTI is a group common RNTI.
Example 12
Embodiment 12 illustrates a schematic diagram of target identities and search space according to one embodiment of the application, as shown in fig. 12.
As an example, the upper row of rectangles in fig. 12 shows K identities in the first set of identities; the lower row of rectangles in fig. 12 shows the K1 search spaces.
As an embodiment, said K1 is equal to 1.
As an embodiment, said K1 is equal to 2.
As an embodiment, said K1 is equal to K.
As an embodiment, K1 is a positive integer.
As one embodiment, the first node receives first information indicating the K1 search spaces.
As an embodiment, the first information indicates a mapping relationship of the K1 search spaces and identities in the first set of identities.
As an embodiment, the first signaling indicates a mapping relationship of the K1 search spaces to identities in the first set of identities.
As one embodiment, the K1 is equal to K, and the K1 search spaces are in one-to-one correspondence with the K identities in the first identity set; and the search space in the K1 search spaces corresponding to the target identity is a target search space.
As an embodiment, the K1 is smaller than K, and at least an ith identity and a jth identity in the first set of identities map to a same one of the K1 search spaces; and the search space in the K1 search spaces corresponding to the target identity is a target search space.
As an embodiment, the first node blindly detects a fifth PDCCH in the target search space, where the fifth PDCCH carries a time-frequency resource used for indicating that a fifth downlink physical channel occupies, or the fifth PDCCH schedules the fifth downlink physical channel; the fifth downlink physical channel carries the target data set.
Example 13
Embodiment 13 illustrates a block diagram of a processing apparatus for use in a first node according to one embodiment of the application; as shown in fig. 13. In fig. 13, the processing means 1400 in the first node comprises a first receiver 1401 and a first transmitter 1402. In the case of the embodiment of the present application in which the sample is a solid,
A first receiver 1401, receiving first signaling, the first signaling being used to indicate a first set of identities of a first service, the first service being a non-unicast service, the first set of identities comprising a plurality of identities; determining a target identity; receiving the target data set by applying the target identity;
Wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the first node is used to determine the target identity.
As one embodiment, the first transmitter 1402 sends a first message, the first message being used to indicate at least one of location information or a first area identity of the first node; the location information of the first node is used to determine the first area identity;
The first receiver 1401 receives second signaling, which indicates the identity of the target.
As an embodiment, the first signaling indicates a first set of areas, the first set of areas comprising K areas, the K areas of the first set of areas being associated with the K identities in the first set of identities, respectively; the first set of regions and the location of the first node are used together to determine the target identity.
As an embodiment, each identity in the first set of identities is a group common RNTI; the first signaling indicates a second set of identities, the second set of identities comprising K identities; the K identities of the second identity set are in one-to-one correspondence with the K identities of the first identity set; any identity in the second set of identities is one of a { logical channel identity, radio bearer identity }; the K data sets of the first service are transmitted simultaneously applying the K identities of the first identity set and the K identities of the second identity set, respectively.
As an embodiment, the first signaling indicates K flows of the first service, where the K flows of the first service are in one-to-one correspondence with the K data sets, and the K flows of the first service are mapped to the same radio bearer for transmission.
As an embodiment, the first receiver 1401 receives first information, which is used to indicate K1 search spaces; each identity of the first set of identities is a group common RNTI; each K identities of the first set of identities is associated with one of the K1 search spaces, where K1 is a positive integer no greater than K.
For one embodiment, the first receiver 1401 receives a second set of target data using a second target identity before determining the target identity; in response to determining the target identity, the first receiver 1401 resets or releases the RLC entity for receiving the second target data set; the second target data set belongs to the first service; the second target identity belongs to the first identity set; the second target identity is different from the target identity.
As an embodiment, the first node is a User Equipment (UE).
As an embodiment, the first node is a terminal supporting a large delay difference.
As an embodiment, the first node is a terminal supporting NTN.
As an embodiment, the first node is an aircraft.
As an embodiment, the first node is an in-vehicle terminal.
As an embodiment, the first node is a relay.
As an embodiment, the first node is a ship.
As an embodiment, the first node is an internet of things terminal.
As an embodiment, the first node is a terminal of an industrial internet of things.
As an embodiment, the first node is a device supporting low latency and high reliability transmissions.
As an embodiment, the first node is a multicast-enabled node.
As an example, the first receiver 1401 includes at least one of the antenna 452, the receiver 454, the receive processor 456, the multi-antenna receive processor 458, the controller/processor 459, the memory 460, or the data source 467 in example 4.
As one example, the first transmitter 1402 includes at least one of the antenna 452, the transmitter 454, the transmit processor 468, the multi-antenna transmit processor 457, the controller/processor 459, the memory 460, or the data source 467 of embodiment 4.
Example 14
Embodiment 14 illustrates a block diagram of a processing arrangement for use in a second node according to one embodiment of the application; as shown in fig. 14. In fig. 14, the processing means 1500 in the second node comprises a second transmitter 1501 and a second receiver 1502. In the case of the embodiment of the present application in which the sample is a solid,
A second transmitter 1501 transmitting first signaling, the first signaling being used to indicate a first set of identities of a first service, the first service being a non-unicast service, the first set of identities comprising a plurality of identities; a receiver of the first signaling determines a target identity and receives the target data set using the target identity;
wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the recipient of the first signaling is used to determine the target identity.
As one embodiment, the second receiver 1502 receives a first message, the first message being used to indicate at least one of location information or a first area identity of the first node; the location information of the sender of the first message is used to determine the first zone identity;
the second transmitter 1501 sends second signaling indicating the identity of the target.
As an embodiment, the first signaling indicates a first set of areas, the first set of areas comprising K areas, the K areas of the first set of areas being associated with the K identities in the first set of identities, respectively; the first set of regions and the location of the receiver of the first signaling are used together to determine the target identity.
As an embodiment, each identity in the first set of identities is a group common RNTI; the first signaling indicates a second set of identities, the second set of identities comprising K identities; the K identities of the second identity set are in one-to-one correspondence with the K identities of the first identity set; any identity in the second set of identities is one of a { logical channel identity, radio bearer identity }; the K data sets of the first service are transmitted simultaneously applying the K identities of the first identity set and the K identities of the second identity set, respectively.
As an embodiment, the first signaling indicates K flows of the first service, the K flows of the first service are in one-to-one correspondence with the K data sets, and the K flows of the first service are mapped onto the same radio bearer.
As an embodiment, the second transmitter 1501 transmits first information, which is used to indicate K1 search spaces; each identity of the first set of identities is a group common RNTI; each K identities of the first set of identities is associated with one of the K1 search spaces, where K1 is a positive integer no greater than K.
As an embodiment, the receiver of the first signaling receives a second set of target data using a second target identity before determining the target identity; in response to determining the target identity, the receiver of the first signaling resets or releases an RLC entity for receiving the second target data set; the second target data set belongs to the first service; the second target identity belongs to the first identity set; the second target identity is different from the target identity.
As an embodiment, the second node is a satellite.
As an embodiment, the second node is a UE (user equipment).
As one embodiment, the second node is an IoT node.
As an embodiment, the second node is a wearable node.
As an embodiment, the second node is a base station.
As an embodiment, the second node is a relay.
As an embodiment, the second node is an access point.
As an embodiment, the second node is a multicast-enabled node.
As an embodiment, the second node is a satellite.
As an example, the second transmitter 1501 includes at least one of the antenna 420, the transmitter 418, the transmission processor 416, the multi-antenna transmission processor 471, the controller/processor 475, and the memory 476 in example 4.
As an example, the second receiver 1502 includes at least one of the antenna 420, the receiver 418, the receive processor 470, the multi-antenna receive processor 472, the controller/processor 475, and the memory 476 of example 4.
Those of ordinary skill in the art will appreciate that all or a portion of the steps of the above-described methods may be implemented by a program that instructs associated hardware, and the program may be stored on a computer readable storage medium, such as a read-only memory, a hard disk or an optical disk. Alternatively, all or part of the steps of the above embodiments may be implemented using one or more integrated circuits. Accordingly, each module unit in the above embodiment may be implemented in a hardware form or may be implemented in a software functional module form, and the present application is not limited to any specific combination of software and hardware. The user equipment, terminal and UE in the present application include, but are not limited to, unmanned aerial vehicles, communication modules on unmanned aerial vehicles, remote control airplanes, aircrafts, mini-planes, mobile phones, tablet computers, notebooks, vehicle-mounted Communication devices, wireless sensors, network cards, internet of things terminals, RFID terminals, NB-IoT terminals, MTC (MACHINE TYPE Communication) terminals, eMTC (ENHANCEDMTC ) terminals, data cards, network cards, vehicle-mounted Communication devices, low cost mobile phones, low cost tablet computers, satellite Communication devices, ship Communication devices, NTN user devices, and other wireless Communication devices. The base station or system equipment in the present application includes, but is not limited to, macro cell base stations, micro cell base stations, home base stations, relay base stations, gNB (NR node B) NR node B, TRP (TRANSMITTER RECEIVERPOINT, transmitting and receiving node), NTN base stations, satellite equipment, flight platform equipment and other wireless communication equipment, eNB (LTE node B), test equipment, such as transceiver devices simulating the functions of the base station part, signaling testers, and the like.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.
Claims (10)
1.A first node for wireless communication, comprising:
A first receiver that receives first signaling, the first signaling being used to indicate a first set of identities of a first service, the first service being a non-unicast service, the first set of identities comprising a plurality of identities; determining a target identity; receiving the target data set by applying the target identity;
Wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the first node is used to determine the target identity.
2. The first node of claim 1, comprising:
A first transmitter that transmits a first message, the first message being used to indicate at least one of location information or a first area identity of the first node; the location information of the first node is used to determine the first area identity;
the first receiver receives second signaling indicating the identity of the target.
3. The first node according to claim 1 or 2, characterized in that,
The first signaling indicates a first set of regions comprising K regions, the K regions of the first set of regions being associated with the K identities in the first set of identities, respectively; the first set of regions and the location of the first node are used together to determine the target identity.
4. A first node according to any one of the claims 1 to 3, characterized in that,
Each identity in the first set of identities is a group common RNTI; the first signaling indicates a second set of identities, the second set of identities comprising K identities; the K identities of the second identity set are in one-to-one correspondence with the K identities of the first identity set; any identity in the second set of identities is one of a { logical channel identity, radio bearer identity }; the K data sets of the first service are transmitted simultaneously applying the K identities of the first identity set and the K identities of the second identity set, respectively.
5. The first node according to any of the claims 1 to 4, characterized in that,
The first signaling indicates K flows of the first service, the K flows of the first service are in one-to-one correspondence with the K data sets, and the K flows of the first service are mapped to the same radio bearer for transmission.
6. The first node according to any of claims 1 to 5, comprising:
the first receiver receives first information, the first information being used to indicate K1 search spaces; each identity of the first set of identities is a group common RNTI; each K identities of the first set of identities is associated with one of the K1 search spaces, where K1 is a positive integer no greater than K.
7. The first node according to any of the claims 1 to 6, characterized in that,
The first receiver receiving a second set of target data using a second target identity prior to determining the target identity; in response to determining the target identity, the first receiver resets or releases the RLC entity for receiving the second target data set; the second target data set belongs to the first service; the second target identity belongs to the first identity set; the second target identity is different from the target identity.
8. A second node for wireless communication, comprising:
A second transmitter that transmits first signaling, the first signaling being used to indicate a first set of identities of a first service, the first service being a non-unicast service, the first set of identities comprising a plurality of identities; a receiver of the first signaling determines a target identity and receives the target data set using the target identity;
wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the recipient of the first signaling is used to determine the target identity.
9. A method in a first node for wireless communication, comprising:
Receiving first signaling, wherein the first signaling is used for indicating a first identity set of a first service, the first service is a non-unicast service, and the first identity set comprises a plurality of identities; determining a target identity; receiving the target data set by applying the target identity;
Wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the first node is used to determine the target identity.
10. A method in a second node for wireless communication, comprising:
transmitting first signaling, wherein the first signaling is used for indicating a first identity set of a first service, the first service is a non-unicast service, and the first identity set comprises a plurality of identities; a receiver of the first signaling determines a target identity and receives the target data set using the target identity;
wherein the first service includes K data sets, the target data set is one of the K data sets, and K is an integer greater than 1; the first set of identities includes K identities, the target identity being one of the K identities of the first set of identities; the K data sets of the first service are respectively identified by the K identities of the first identity set; any identity of the first set of identities is one of { search space identity, group common RNTI, logical channel identity, radio bearer identity }; the location of the recipient of the first signaling is used to determine the target identity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311490797.3A CN118199825A (en) | 2021-01-15 | 2021-01-15 | Method and apparatus for wireless communication |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110053788.2A CN114765745A (en) | 2021-01-15 | 2021-01-15 | Method and equipment used for wireless communication |
CN202311490797.3A CN118199825A (en) | 2021-01-15 | 2021-01-15 | Method and apparatus for wireless communication |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110053788.2A Division CN114765745A (en) | 2021-01-15 | 2021-01-15 | Method and equipment used for wireless communication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118199825A true CN118199825A (en) | 2024-06-14 |
Family
ID=82364122
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110053788.2A Withdrawn CN114765745A (en) | 2021-01-15 | 2021-01-15 | Method and equipment used for wireless communication |
CN202311490797.3A Pending CN118199825A (en) | 2021-01-15 | 2021-01-15 | Method and apparatus for wireless communication |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110053788.2A Withdrawn CN114765745A (en) | 2021-01-15 | 2021-01-15 | Method and equipment used for wireless communication |
Country Status (2)
Country | Link |
---|---|
US (1) | US20220232351A1 (en) |
CN (2) | CN114765745A (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10686558B1 (en) * | 2019-02-26 | 2020-06-16 | At&T Intellectual Property I, L.P. | Forward error correction adjustments for C-V2X communications |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7415243B2 (en) * | 2003-03-27 | 2008-08-19 | Honda Giken Kogyo Kabushiki Kaisha | System, method and computer program product for receiving data from a satellite radio network |
US10264566B2 (en) * | 2016-07-22 | 2019-04-16 | Qualcomm Incorporated | Enhanced control channel for DL sub-band scheduling |
US11398930B2 (en) * | 2019-05-02 | 2022-07-26 | Ofinno, Llc | Uplink operations of multi-transmission reception points and panel |
KR102700282B1 (en) * | 2020-03-24 | 2024-08-28 | 지티이 코포레이션 | Dynamic changes in multicast/broadcast service provisioning |
-
2021
- 2021-01-15 CN CN202110053788.2A patent/CN114765745A/en not_active Withdrawn
- 2021-01-15 CN CN202311490797.3A patent/CN118199825A/en active Pending
-
2022
- 2022-01-14 US US17/575,657 patent/US20220232351A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
CN114765745A (en) | 2022-07-19 |
US20220232351A1 (en) | 2022-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN115225239B (en) | Method and apparatus for wireless communication | |
CN114979966B (en) | Method and apparatus in a communication node for wireless communication | |
US20220232351A1 (en) | Method and device for wireless communication | |
CN115118400B (en) | Method and apparatus for wireless communication | |
CN114666416B (en) | Method and apparatus for wireless communication | |
US20220210869A1 (en) | Method and device used in communication node for wireless communication | |
CN114095873B (en) | Method and apparatus in a node for wireless communication | |
CN113727343B (en) | Method and apparatus for wireless communication | |
CN114916095A (en) | Method and equipment used for wireless communication | |
CN114554568A (en) | Method and equipment used for wireless communication | |
CN113573249B (en) | Method and apparatus in a node for wireless communication | |
CN113595695B (en) | Method and apparatus for wireless communication | |
CN114205060B (en) | Method and apparatus in a node for wireless communication | |
CN115396822B (en) | Method and apparatus in a node for wireless communication | |
CN113543038B (en) | Method and device used in node of wireless communication | |
CN114629608B (en) | Method and apparatus in a communication node for wireless communication | |
CN114629606B (en) | Method and apparatus in a node for wireless communication | |
CN114205060A (en) | Method and apparatus in a node used for wireless communication | |
CN113891254A (en) | Method and apparatus in a node used for wireless communication | |
CN114696977A (en) | Method and arrangement in a communication node used for wireless communication | |
CN117939472A (en) | Method and apparatus for wireless communication | |
CN118741735A (en) | Method and apparatus for wireless communication | |
CN117693026A (en) | Method and apparatus for wireless communication | |
CN118784169A (en) | Method and apparatus for wireless communication | |
CN118175608A (en) | Method and apparatus in a communication node for wireless communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |